From: Jouni Malinen Date: Sun, 18 Jul 2010 00:48:32 +0000 (-0700) Subject: FT: Fix RRB messages to use correct endianness X-Git-Tag: hostap-1-bp~1264 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=e9501a07c629ffb7e3448dae9189793b9031bc50;p=thirdparty%2Fhostap.git FT: Fix RRB messages to use correct endianness The pairwise cipher field is supposed to be little endian, but the message building functions did not swap the bytes on big endian hosts while the message processing functions did. Fix this by using little endian byte order in both places. --- diff --git a/src/ap/wpa_auth_ft.c b/src/ap/wpa_auth_ft.c index 0ab3fb4a4..9112f2b81 100644 --- a/src/ap/wpa_auth_ft.c +++ b/src/ap/wpa_auth_ft.c @@ -1431,7 +1431,7 @@ static int wpa_ft_rrb_rx_pull(struct wpa_authenticator *wpa_auth, wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", r.pmk_r1, PMK_LEN); wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", r.pmk_r1_name, WPA_PMK_NAME_LEN); - r.pairwise = pairwise; + r.pairwise = host_to_le16(pairwise); if (aes_wrap(r1kh->key, (FT_R0KH_R1KH_RESP_DATA_LEN + 7) / 8, r.nonce, resp.nonce) < 0) { @@ -1734,7 +1734,7 @@ static void wpa_ft_generate_pmk_r1(struct wpa_authenticator *wpa_auth, WPA_PMK_NAME_LEN); os_get_time(&now); WPA_PUT_LE32(f.timestamp, now.sec); - f.pairwise = pairwise; + f.pairwise = host_to_le16(pairwise); if (aes_wrap(r1kh->key, (FT_R0KH_R1KH_PUSH_DATA_LEN + 7) / 8, f.timestamp, frame.timestamp) < 0) return;